期刊文献+
共找到3,046篇文章
< 1 2 153 >
每页显示 20 50 100
基于Group-Lasso-Logistic的网络信贷违约预测研究
1
作者 李气芳 周诗妮 《佳木斯大学学报(自然科学版)》 2026年第1期177-180,共4页
针对网络信贷问题,基于某信贷平台数据构建Group-Lasso-Logistic模型,探讨影响贷款申请人违约的因素,并与全变量Logistic模型、逐步回归Logistic模型、Lasso-Logistic模型进行对比分析。研究发现:Group-Lasso-Logistic模型的评价性能最... 针对网络信贷问题,基于某信贷平台数据构建Group-Lasso-Logistic模型,探讨影响贷款申请人违约的因素,并与全变量Logistic模型、逐步回归Logistic模型、Lasso-Logistic模型进行对比分析。研究发现:Group-Lasso-Logistic模型的评价性能最好,且模型最简洁;贷款金额、贷款利率、分期付款金额以及贷款申请状态对贷款申请人违约风险起正向作用;年收入以及贷款人信用档案中当前的信用总额对贷款申请人违约风险起反向作用;贷款人在登记时所提供的房屋所有权状况为1以及验证状态为1或2这类人更容易发生违约;Group-Lasso-Logistic模型具有稳健性,且不同地区之间存在异质性。 展开更多
关键词 网络信贷 group-Lasso-Logistic 稳健性 异质性
在线阅读 下载PDF
Consensus model of social network group decision-making based on trust relationship among experts and expert reliability 被引量:4
2
作者 WANG Ya CAI Mei JIAN Xinglian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第6期1576-1588,共13页
Due to people’s increasing dependence on social networks,it is essential to develop a consensus model considering not only their own factors but also the interaction between people.Both external trust relationship am... Due to people’s increasing dependence on social networks,it is essential to develop a consensus model considering not only their own factors but also the interaction between people.Both external trust relationship among experts and the internal reliability of experts are important factors in decision-making.This paper focuses on improving the scientificity and effectiveness of decision-making and presents a consensus model combining trust relationship among experts and expert reliability in social network group decision-making(SN-GDM).A concept named matching degree is proposed to measure expert reliability.Meanwhile,linguistic information is applied to manage the imprecise and vague information.Matching degree is expressed by a 2-tuple linguistic model,and experts’preferences are measured by a probabilistic linguistic term set(PLTS).Subsequently,a hybrid weight is explored to weigh experts’importance in a group.Then a consensus measure is introduced and a feedback mechanism is developed to produce some personalized recommendations with higher group consensus.Finally,a comparative example is provided to prove the scientificity and effectiveness of the proposed consensus model. 展开更多
关键词 social network group decision-making(SN-GDM) trust relationship expert reliability consensus model probabilistic linguistic term set(PLTS).
在线阅读 下载PDF
Synchronization investigation of the network group constituted by the nearest neighbor networks under inner and outer synchronous couplings
3
作者 李亭亭 李成仁 +4 位作者 王晨 何芳君 周光冶 孙景昌 韩非 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第12期572-576,共5页
A new synchronization technique of inner and outer couplings is proposed in this work to investigate the synchro- nization of network group. Some Haken-Lorenz lasers with chaos behaviors are taken as the nodes to cons... A new synchronization technique of inner and outer couplings is proposed in this work to investigate the synchro- nization of network group. Some Haken-Lorenz lasers with chaos behaviors are taken as the nodes to construct a few nearest neighbor complex networks and those sub-networks are also connected to form a network group. The effective node controllers are designed based on Lyapunov function and the complete synchronization among the sub-networks is realized perfectly under inner and outer couplings. The work is of potential applications in the cooperation output of lasers and the communication network. 展开更多
关键词 synchronization of network group inner and outer couplings Haken-Lorenz laser nearest neigh-bor network
原文传递
Cascading failure in multilayer networks with dynamic dependency groups*
4
作者 Lei Jin Xiaojuan Wang +1 位作者 Yong Zhang and Jingwen You 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第9期645-651,共7页
The cascading failure often occurs in real networks. It is significant to analyze the cascading failure in the complex network research. The dependency relation can change over time. Therefore, in this study, we inves... The cascading failure often occurs in real networks. It is significant to analyze the cascading failure in the complex network research. The dependency relation can change over time. Therefore, in this study, we investigate the cascading fail- ure in multilayer networks with dynamic dependency groups. We construct a model considering the recovery mechanism. In our model, two effects between layers are defined. Under Effect 1, the dependent nodes in other layers will be disabled as long as one node does not belong to the largest connected component in one layer. Under Effect 2, the dependent nodes in other layers will recover when one node belongs to the largest connected component. The theoretical solution of the largest component is deduced and the simulation results verify our theoretical solution. In the simulation, we analyze the influence factors of the network robustness, including the fraction of dependent nodes and the group size, in our model. It shows that increasing the fraction of dependent nodes and the group size will enhance the network robustness under Effect 1. On the contrary, these will reduce the network robustness under Effect 2. Meanwhile, we find that the tightness of the network connection will affect the robustness of networks. Furthermore, setting the average degree of network as 8 is enough to keep the network robust. 展开更多
关键词 cascading failure dependency group multilayer network
原文传递
A Trustworthy Group Identifying Trust Metric for P2P Service Sharing Economy Based on Personal Social Network of Users 被引量:1
5
作者 ZHU Wenqiang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期139-149,共11页
With the quick growth of sharing economy, service sharing becomes a popular phenomenon in daily lives. However, some service providers give exaggerated information about their services on the Peer-to-Peer(P2 P) serv... With the quick growth of sharing economy, service sharing becomes a popular phenomenon in daily lives. However, some service providers give exaggerated information about their services on the Peer-to-Peer(P2 P) service sharing platforms to get more profits. How to identify a reliable service provider becomes a difficult challenge for users. In this paper, we propose a trustworthy group trust metric for P2 P service sharing(TMPSS) economy based on personal social network(PSN) of users. Deriving from Advogato group trust metric, it considers factors such as social circle similarity, preference similarity, interaction degree, ranks the reliable nodes in a target user's PSN, outputs an ordered set of reliable nodes, and prevents unreliable nodes from access PSN of honest users. Experimental results show that TMPSS has advantages over existing representative methods because it finds more reliable nodes, and counts against malicious nodes' attacks more effectively, and it is suitable for mobile transaction circumstances. 展开更多
关键词 service sharing economy P2P service sharing trust-worthy group identifying personal social network
原文传递
Network Group Psychological Education of College Students
6
作者 Hazel Han Yonggang Li 《Journal of Contemporary Educational Research》 2020年第7期47-54,共8页
Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and ... Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and puts forward the educational strategies to solve college students’network mass incidents:(1)Adhere to humanism and take appeals as the center;(2)To improve the campus network public opinion guidance mechanism under the guidance of relevant social cognition theories;(3)Strengthen communication and improve communication skills;(4)Promote information disclosure and transparency,and eliminate uncertainty and ambiguity. 展开更多
关键词 College students network group event Psychological analysis Education countermeasures
在线阅读 下载PDF
Research on the Evolution Structure of Fragment Disordering Public Opinion in College Students’ Network Circle Group
7
作者 Huawei Zhi Yan Qiao 《Social Networking》 2024年第4期45-65,共21页
Clarifying the evolution structure of public opinion induced and spread by fragmentation in college students’ network circle group is the key to understanding college students’ online social psychological demands, g... Clarifying the evolution structure of public opinion induced and spread by fragmentation in college students’ network circle group is the key to understanding college students’ online social psychological demands, grasping the development trend of public opinion, and designing targeted public opinion governance strategies. On the basis of identifying the key variables in the process of public opinion communication, DEMATEL-ISM model is used to explore the attribute positioning, relative importance level and hierarchical association mechanism of ante-variable and result variable, and then the governance strategies for fragment disordering public opinion in network circle groups of college students is designed. According to the study, exogenous stimuli, the uniqueness of discourse system, the number of spectacular texts and micro-narrative mode constituted the deep-rooted causes of fragment disordering public opinion. The unique situational and information attributes of network circle groups often become an important “booster” of disordered public opinion. The topic deviation is often accompanied with the formation of negative emotions. The corresponding public opinion governance strategies are sought from the aspects of shaping the network environment, adjusting the operation mechanism of the network circle group, improving the efficiency of using fragmented information, and optimizing the human resources of colleges. 展开更多
关键词 College Students’ network Circle group Fragment Disordering Public Opinion Governance DEMATEL ISM
在线阅读 下载PDF
Network Group Psychological Education of College Students
8
作者 Zhenzi Han Yonggang Li 《Journal of Psychological Research》 2020年第3期23-29,共7页
Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and ... Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and puts forward the educational strategies to solve college students’network mass incidents:No.1.Adhere to humanism and take appeals as the center;No.2.To improve the campus network public opinion guidance mechanism under the guidance of relevant social cognition theories;No.3.Strengthen communication and improve communication skills;No.4.Promote information disclosure and transparency,and eliminate uncertainty and ambiguity. 展开更多
关键词 College students network group event psychological analysis Education countermeasures
在线阅读 下载PDF
Mining Social Groups with Weighted Similarity in Campus Wireless Network 被引量:1
9
作者 吴利兵 薛广涛 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期99-102,共4页
With the popularity of wireless networks and the prevalence of personal mobile computing devices, understanding the characteristic of wireless network users is of great significance to the network performance. In this... With the popularity of wireless networks and the prevalence of personal mobile computing devices, understanding the characteristic of wireless network users is of great significance to the network performance. In this study, system logs from two universities, Dartmouth College and Shanghai Jiao Tong University(SJTU), were mined and analyzed. Every user's log was represented by a user profile. A novel weighted social similarity was proposed to quantify the resemblance of users considering influence of location visits. Based on the similarity, an unsupervised learning method was applied to cluster users. Though environment parameters are different, two universities both form many social groups with Pareto distribution of similarity and exponential distribution of group sizes. These findings are very important to the research of wireless network and social network . 展开更多
关键词 wireless network weighted similarity social groups unsupervised learning CLUSTERING
在线阅读 下载PDF
ZTE to Supply Bearer Network Solution to Finnet Group
10
作者 ZTE Corperation 《ZTE Communications》 2010年第1期59-59,共1页
ZTE Corporation, a leading global provider of telecommunications equipment and network solutions, announced an agreement with Westlink part of the Finish telecommunications group Finnet, to supply a unified multi-serv... ZTE Corporation, a leading global provider of telecommunications equipment and network solutions, announced an agreement with Westlink part of the Finish telecommunications group Finnet, to supply a unified multi-service metro bearer solution on February 18, 2010. 展开更多
关键词 ZTE to Supply Bearer network Solution to Finnet group PTN IP
在线阅读 下载PDF
Reliable Content Distribution in P2P Networks Based on Peer Groups
11
作者 Elias P. Duarte Jr. Ana Flavia B. Godoi 《International Journal of Internet and Distributed Systems》 2014年第2期5-14,共10页
Peer-to-Peer (P2P) networks are highly dynamic systems which are very popular for content distribution in the Internet. A single peer remains in the system for an unpredictable amount of time, and the rate in which pe... Peer-to-Peer (P2P) networks are highly dynamic systems which are very popular for content distribution in the Internet. A single peer remains in the system for an unpredictable amount of time, and the rate in which peers enter and leave the system, i.e. the churn, is often high. A user that is obtaining content from a selected peer is frequently informed that particular peer is not available anymore, and is asked to select another peer, or will have another peer assigned, often without enough checks to confirm that the content provided by the new peer presents the same quality of the previous peer. In this work we present a strategy based on group communication for transparent and robust content access in P2P networks. Instead of accessing a single peer for obtaining the desired content, a user request is received and processed by a group of peers. This group of peers, called PCG (Peer Content Group) provides reliable content access in sense that even as members of the group crash or leave the system, users continue to receive the content if at least one group member remains fault-free. Each PCG member is capable of independently serving the request. A PCG is transparent to the user, as the group interface is identical to the interface provided by a single peer. A group member is elected to serve each request. A fault monitoring component allows the detection of member crashes. If the peer is serving request crashes, another group member is elected to continue providing the service. The PCG and a P2P file sharing applications were implemented in the JXTA platform. Evaluation results are presented showing the latency of group operations and system components. 展开更多
关键词 CONTENT Distribution PEER-TO-PEER networks group COMMUNICATION
暂未订购
ZTE Partners with KPN Group Belgium to Deploy Packet-Switched Core Network
12
作者 ZTE Corporation 《ZTE Communications》 2012年第3期21-21,共1页
27 August 2012--ZTE Corporation has signed a deal on a packet-switched core network (CN) for KPN Group Belgium (KPNGB). KPNGB will deploy ZTE's packet-switched CN equipment, which supports unified radio access. T... 27 August 2012--ZTE Corporation has signed a deal on a packet-switched core network (CN) for KPN Group Belgium (KPNGB). KPNGB will deploy ZTE's packet-switched CN equipment, which supports unified radio access. The contract is the second of its kind between ZTE and KPNfollows from a construction project with KPN Germany (E-Plus) that was completed in September 2010. 展开更多
关键词 ZTE Partners with KPN group Belgium to Deploy Packet-Switched Core network CORE PLUS
在线阅读 下载PDF
A target group tracking algorithm based on a hybrid sensor network
13
作者 Chun Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期77-86,共10页
Traditional tracking algorithms based on static sensors have several problems. First, the targets only occur in a part of the interested area; however, a large number of static sensors are distributed in the area to g... Traditional tracking algorithms based on static sensors have several problems. First, the targets only occur in a part of the interested area; however, a large number of static sensors are distributed in the area to guarantee entire coverage, which leads to wastage of sensor resources. Second, many static sensors have to remain in active mode to track the targets, which causes an increase of energy consumption. To solve these problems, a target group tracking algorithm based on a hybrid sensor network is proposed in this paper, which includes static sensors and mobile sensors. First, an estimation algorithm is proposed to estimate the objective region by static sensors, which work in low-power sensing mode. Second, a movement algorithm based on sliding windows is proposed for mobile sensors to obtain the destinations. Simulation results show that this algorithm can reduce the number of mobile sensors participating in the tracking task and prolong the network lifetime. 展开更多
关键词 hybrid sensor network target group tracking mobile sensors
原文传递
A target group tracking algorithm for wireless sensor networks using azimuthal angle of arrival information
14
作者 张淳 费树岷 周杏鹏 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第12期1-10,共10页
In this paper, we explore the technology of tracking a group of targets with correlated motions in a wireless sensor network. Since a group of targets moves collectively and is restricted within a limited region, it i... In this paper, we explore the technology of tracking a group of targets with correlated motions in a wireless sensor network. Since a group of targets moves collectively and is restricted within a limited region, it is not worth consuming scarce resources of sensors in computing the trajectory of each single target. Hence, in this paper, the problem is modeled as tracking a geographical continuous region covered by all targets. A tracking algorithm is proposed to estimate the region covered by the target group in each sampling period. Based on the locations of sensors and the azimuthal angle of arrival (AOA) information, the estimated region covering all the group members is obtained. Algorithm analysis provides the fundamental limits to the accuracy of localizing a target group. Simulation results show that the proposed algorithm is superior to the existing hull algorithm due to the reduction in estimation error, which is between 10% and 40% of the hull algorithm, with a similar density of sensors. And when the density of sensors increases, the localization accuracy of the proposed algorithm improves dramatically. 展开更多
关键词 wireless sensor network target group TRACKING azimuthal angle estimation error
原文传递
GENERALIZED INVERSE GROUP OF SIGNAL AND ITS IMPLEMENTATION WITH NEURAL NETWORKS
15
作者 何明一 《Journal of Electronics(China)》 1994年第1期1-10,共10页
A new concept, the generalized inverse group (GIG) of signal, is firstly proposed and its properties, leaking coefficients and implementation with neural networks are presented. Theoretical analysis and computational ... A new concept, the generalized inverse group (GIG) of signal, is firstly proposed and its properties, leaking coefficients and implementation with neural networks are presented. Theoretical analysis and computational simulation have shown that (1) there is a group of finite length of generalized inverse signals for any given finite signal, which forms the GIG; (2) each inverse group has different leaking coefficients, thus different abnormal states; (3) each GIG can be implemented by a grouped and improved single-layer perceptron which appears with fast convergence. When used in deconvolution, the proposed GIG can form a new parallel finite length of filtering deconvolution method. On off-line processing, the computational time is reduced to O(N) from O(N2). And the less the leaking coefficient is, the more reliable the deconvolution will be. 展开更多
关键词 SIGNAL processing NEURAL networks Generalized INVERSE group DECONVOLUTION
在线阅读 下载PDF
Emergence of Group Cooperation in Public Goods Game on Regular Small-World Network
16
作者 ZHANG Yingqing FAN Ruguo LUO Ming 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第6期529-534,共6页
The regular small-world network, which contains the properties of small-world network and regular network, has recently received substantial attention and has been applied in researches on 2-person games. However, it ... The regular small-world network, which contains the properties of small-world network and regular network, has recently received substantial attention and has been applied in researches on 2-person games. However, it is a common phenomenon that cooperation always appears as a group behavior. In order to investigate the mechanism of group cooperation, we propose an evolutionary multi-person game model on a regular small-world network based on public goods game theory. Then, to make a comparison of frequency of cooperation among different networks, we carry out simulations on three kinds of networks with the same configuration of average degree: the square lattice, regular small-world network and random regular network. The results of simulation show that the group cooperation will emerge among these three networks when the enhancement factor r exceeds a threshold. Furthermore, time required for full cooperation on regular small-world network is slightly longer than the other networks, which indicates that the compact interactions and random interactions will promote cooperation, while the longer-range links are the obstacles in the emergence of cooperation. In addition, the cooperation would be promoted further by enhancing the random interactions on regular small-world network. 展开更多
关键词 regular small-world network public goods game group cooperation
原文传递
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography 被引量:1
17
作者 Krishnan Kumar J. Nafeesa Begum V. Sumathy 《International Journal of Communications, Network and System Sciences》 2010年第4期369-379,共11页
This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group... This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost. 展开更多
关键词 Ad HOC network Region-Based group Key AGREEMENT Protocol ELLIPTIC CURVE DIFFIE-HELLMAN Tree-Based group ELLIPTIC CURVE DIFFIE-HELLMAN
在线阅读 下载PDF
The Group Method of Data Handling (GMDH) and Artificial Neural Networks (ANN)in Time-Series Forecasting of Rice Yield
18
作者 Nadira Mohamed Isa Shabri Ani Samsudin Ruhaidah 《材料科学与工程(中英文B版)》 2011年第3期378-387,共10页
关键词 时间序列预测模型 人工神经网络 GMDH 水稻产量 数据处理 ANN 多项式函数 双曲线
在线阅读 下载PDF
社交网络群组用户知识共享行为动机研究:以Facebook Group和微信群为例 被引量:23
19
作者 耿瑞利 申静 《情报学报》 CSSCI CSCD 北大核心 2018年第10期1022-1033,共12页
当前社交网络群组吸引着大量高度活跃的用户,使其可以发布丰富的原创内容,进行频繁的知识交流与传播。本文基于自我决定理论梳理社交网络群组用户知识共享行为的内在和外在动机,依据计划行为理论引入知识共享意愿在动机与行为之间的中... 当前社交网络群组吸引着大量高度活跃的用户,使其可以发布丰富的原创内容,进行频繁的知识交流与传播。本文基于自我决定理论梳理社交网络群组用户知识共享行为的内在和外在动机,依据计划行为理论引入知识共享意愿在动机与行为之间的中介作用,基于自我建构理论引入自我建构类型对行为动机的调节作用,构建了社交网络群组用户知识共享行为动机模型,并通过问卷调查法采集微信群和Facebook Group共计467份样本数据,采用PLS-SEM方法对模型进行检验。研究结果显示:利他和社交参与是最主要的知识共享行为动机;自我效能和互惠受用户自我建构类型的调节,依存自我显著负向调节自我效能与微信群用户知识共享意愿的相关关系,独立自我显著负向调节互惠与Facebook Group用户知识共享意愿的相关关系。本研究从个体自我认知角度提出了动机差异的文化阐释,丰富了知识共享行为动机的理论研究,并对社交网络的知识管理具有实践指导意义。 展开更多
关键词 社交网络群组 知识共享 行为动机 自我建构
在线阅读 下载PDF
基于CNN和Group Normalization的校园垃圾图像分类 被引量:11
20
作者 王玉 王梦佳 张伟红 《吉林大学学报(信息科学版)》 CAS 2020年第6期744-750,共7页
为解决大学校园的垃圾回收分类问题,提出了一种基于卷积神经网络和归一化技术的垃圾图像分类方法,不需要对输入的图像进行复杂的处理,网络模型即可根据算法提取图像特征,通过加入群组归一化(Group Normalization)和网络模型各层之间的协... 为解决大学校园的垃圾回收分类问题,提出了一种基于卷积神经网络和归一化技术的垃圾图像分类方法,不需要对输入的图像进行复杂的处理,网络模型即可根据算法提取图像特征,通过加入群组归一化(Group Normalization)和网络模型各层之间的协作,克服传统分类算法的缺点,实现对垃圾图像的分类。实验表明,该识别方法具有较高准确率,可以较好识别不可回收及可回收垃圾。 展开更多
关键词 卷积神经网络 群组归一化 图像分类 深度学习
在线阅读 下载PDF
上一页 1 2 153 下一页 到第
使用帮助 返回顶部